How to upgrade OpenSSL in CentOS 6.5 / Linux / Unix from source?

前端 未结 11 1375
刺人心
刺人心 2020-12-12 18:13

How do I upgrade OpenSSL in CentOS 6.5?

I have used these commands, but nothings happens:

 cd /usr/src
 wget http://www.openssl.org/source/openssl-1.         


        
相关标签:
11条回答
  • it is easy! you are downloading the binary file?. download the rpm latest package openssl-1.0.1e-30.el6.x86_64 check what was the current version using rpm -q openssl. if this is older then do rpm -U openssl-1.0.1e-30.el6.x86_64 . if yum is configured updated this package in the repo and do yum update openssl if your repo in RHN do simply yum update openssl-1.0.1g is very old and valnuarable

    0 讨论(0)
  • 2020-12-12 18:46

    You should replace the old OpenSSL binary file by the new one via a symlink:

    sudo ln -sf /usr/local/ssl/bin/openssl `which openssl`
    

    Remember that after this procedure you should reboot the server or restart all the services related to OpenSSL.

    0 讨论(0)
  • 2020-12-12 18:47

    To manually compile OpenSSL, do as follows:

    $ cd /usr/src
    
    $ wget https://www.openssl.org/source/openssl-1.0.1g.tar.gz -O openssl-1.0.1g.tar.gz
    
    $ tar -zxf openssl-1.0.1g.tar.gz
    
    $ cd openssl-1.0.1g
    
    $ ./config
    
    $ make
    
    $ make test
    
    $ make install
    
    $ openssl version
    

    If it shows the old version, do the steps below.

    $ mv /usr/bin/openssl /root/
    
    $ ln -s /usr/local/ssl/bin/openssl /usr/bin/openssl
    openssl version
    OpenSSL 1.0.1g 7 Apr 2014
    

    http://olaitanmayowa.com/heartbleed-how-to-upgrade-openssl-in-centos/

    0 讨论(0)
  • 2020-12-12 18:51

    The fix for the heartbleed vulnerability has been backported to 1.0.1e-16 by Red Hat for Enterprise Linux see, and this is therefore the official fix that CentOS ships.

    Replacing OpenSSL with the latest version from upstream (i.e. 1.0.1g) runs the risk of introducing functionality changes which may break compatibility with applications/clients in unpredictable ways, causes your system to diverge from RHEL, and puts you on the hook for personally maintaining future updates to that package. By replacing openssl using a simple make config && make && make install means that you also lose the ability to use rpm to manage that package and perform queries on it (e.g. verifying all the files are present and haven't been modified or had permissions changed without also updating the RPM database).

    I'd also caution that crypto software can be extremely sensitive to seemingly minor things like compiler options, and if you don't know what you're doing, you could introduce vulnerabilities in your local installation.

    0 讨论(0)
  • 2020-12-12 18:52

    The only thing you have to do is perform an yum update.

    It will automatically download and update a backported version of openssl-1.0.1e-16.el6_5.7 which has been patched by RedHat with heartbeat disabled.

    To verify the update simply check the changelog:
    # rpm -q --changelog openssl-1.0.1e | grep -B 1 CVE-2014-0160
    you should see the following:
    * Mon Apr 07 2014 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-16.7 - fix CVE-2014-0160 - information disclosure in TLS heartbeat extension

    Make sure you reboot the server because important services such as Apache and SSH use openSSL.

    0 讨论(0)
提交回复
热议问题